CFP
ADV1SEC: Recent Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) |
Website | http://sites.google.com/site/advseciotcps |
Submission link | https://easychair.org/conferences/?conf=adv1sec |
Abstract registration deadline | October 10, 2019 |
Submission deadline | October 30, 2019 |
----------------------
Call for Book Chapters
----------------------
"Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) "
CRC Press, Taylor & Francis Group, USA
Important Dates
* Proposal Submission: September 20, 2019
* Proposal (Acceptance/Rejection): October 15, 2019 (no later than)
* Sample Chapter (Acceptance/Rejection): January 1, 2020
* Complete Chapter Submission (to editors): April 5, 2020
* Submission of Chapters (to publisher): April 15, 2020
* Publication Time: Q4/2020 (estimated)
* Proposal (Acceptance/Rejection): October 15, 2019 (no later than)
* Sample Chapter (Acceptance/Rejection): January 1, 2020
* Complete Chapter Submission (to editors): April 5, 2020
* Submission of Chapters (to publisher): April 15, 2020
* Publication Time: Q4/2020 (estimated)
Internet of Things (IoT) and CPS (Cyber-Physical Systems) provide mechanisms that are monitored and controlled by computing algorithms that are tightly coupled among users and the Internet. That is, the hardware and the software entities are intertwined and they typically function on different time and location-based scales. Security, privacy and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security.
Different security concerns revolve around the collection, aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and provision of appropriate mitigation techniques are important research areas with respect to these systems. Adoption of best practices and maintaining a balance between ease of use and security are again crucial for the effective performance of these systems.
This book will discuss, present techniques and methodologies as well wide range of examples and illustrations to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. It will be full of valuable insights into security, privacy, and trust in IoT and CPS and will cover most of the important security aspects and current trends that are missed in other books. In addition, it will be an excellent reference book to courses on security, privacy, and trust for IoT and CPS. The material will prepare readers for exercising better protection/defense in terms of understanding the motivation of attackers and how to deal with as well to mitigate the situation in a better manner.
Topics include, but are not limited to, the following:
- Fundamentals, Overviews, and Trends of Computer Networks and Cyber Security
- Cyber risk, Cyber-crime, Cyber threat analysis, and modeling
- Cyber forensic tools, techniques, and analysis
- Security of cyber-physical cloud systems
- Cloud computing and services for cyber-physical systems
- Energy management for cyber-physical cloud systems.
- Real-time data analytics and data stream management for cyber-physical systems
- Context-aware event processing for cyber-physical systems
- Security challenges in cyber-physical cloud systems
- Data virtualization and data-as-a-service in cyber-physical systems
- Cyber-physical cloud systems for smart city, smart energy grid
- Internet of Things and real-time cloud services
- Data-driven framework for cyber-physical systems
- Situational awareness in cyber-physical systems
- Adaptive attack mitigation for CPS
- Authentication and access control for CPS
- Availability, recovery, and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security and privacy
- EV charging system security
- Intrusion detection for CPS
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- Security and privacy in industrial control systems
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security and privacy
- IoT-powered botnets
- iBeacon security and privacy
- Forensics on IoT devices
- HCI and security and privacy in IoT
- Mobile service privacy for IoT devices
- Reverse engineering and automated analysis of IoT malware
- Security and privacy in IoT operating systems and middleware
- IoT payment applications
- Standardization efforts related to IoT
- Testbeds and case studies for IoT
- Traffic monitoring and intrusion detection for IoT
- Virtualization solutions to IoT security
- Security and privacy for IoT-based smart cities
- Ethics, legal, and social considerations in IoT security
- Biometric modalities involved in IoT security
- Cyber attacks detection and prevention systems for IoT networks
- Cloud computing-based security solutions for IoT data
- Security and privacy issues in heterogeneous IoT
- Cloud of Things security and privacy issues
- Intrusion detection for IoT
- Trust Management for IoT
- Deep learning models for the service-centric Internet of things
- Deep Learning architectures for optimizing time series computational data in IoTs
- Energy Efficient Machine Learning and Data Analytics Techniques in IoT for Industry
- Multimedia data management in IoT
- Dynamic processes in IoT
- Security protocols in service-centric IoT
- Information revelation and privacy in IoT
- Dependable and Reliable IoT Analytics
* Proposal submission
A proposal for book chapter is needed from prospective authors before the proposal *submission due date*, describing the objective, scope, and structure of the proposed chapter (no more than 5 pages). Acceptance of chapter proposals will be communicated to lead chapter authors after a formal double-blind review process, to ensure relevance, quality, and originality. The submission of chapter proposals should be processed via Easychair system (https://easychair.org/conferences/?conf=adv1sec).
* Book Editors
Kuan-Ching Li, Providence University, Taiwan, kuancli@gm.pu.edu.tw
Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana, India, gupta.brij@ieee.org
Dharma P. Agrawal, University of Cincinnati, Cincinnati, USA, dpa@cs.uc.edu
* Additional Information
Inquiries and chapter proposal submissions can be forwarded electronically by email, to:
Brij Gupta (email: gupta.brij@ieee.org), Kuan-Ching Li (email: kuancli@gm.pu.edu.tw) and Dharma P. Agrawal (email: dpa@cs.uc.edu)